Identify the event level of the incident, who needs to be contacted, and when should they be contacted based on the company’s incident response plan.

BBM1 — BBM1 TASK 1: CYBERSECURITY MANAGEMENT II – TACTICAL

Summarize the results of the security vulnerability report, nmap host scan and alarm report; including which systems and data were compromised. Be sure to address the basic assessment questions from the attached “Incident Response Plan” as part of your submission. Record your responses in the attached “NOC Reporting Template.”

Explain the steps you will take to identify any exploited systems and data that are included in the scope of the incident as part of your documentation in the attached “NOC Reporting Template.”

Scan Response

Identify the event level of the incident, who needs to be contacted, and when should they be contacted based on the company’s incident response plan. Record your responses in the attached “NOC Reporting Template.”